A critical analysis of Zero Trust Architecture (ZTA)
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by
industry and government as a new way to produce systems with a high degree of security …
industry and government as a new way to produce systems with a high degree of security …
Small changes, big changes: an updated view on the android permission system
Since the appearance of Android, its permission system was central to many studies of
Android security. For a long time, the description of the architecture provided by Enck et al. in …
Android security. For a long time, the description of the architecture provided by Enck et al. in …
A Survey on Mobile Digital Forensic: Taxonomy, Tools, and Challenges
B Patel, PS Mann - Security and Privacy, 2024 - Wiley Online Library
Modern time largely rely on mobile gadgets as a means of communication, and
entertainment. These gadgets now plays a vital role in forensic analysis and criminal …
entertainment. These gadgets now plays a vital role in forensic analysis and criminal …
Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness
As smartphones such as mobile devices become popular, malicious attackers are choosing
them as targets. The risk of attack is steadily increasing as most people store various …
them as targets. The risk of attack is steadily increasing as most people store various …
Evaluation of resource-based app repackaging detection in android
Android app repackaging threatens the health of application markets, as repackaged apps,
besides stealing revenue for honest developers, are also a source of malware distribution …
besides stealing revenue for honest developers, are also a source of malware distribution …
Comparative analysis of different Operating systems for Raspberry Pi in terms of scheduling, synchronization, and memory management
Deep learning, big data, and the internet of things (IoT) have changed the world entirely. As
an embedded computer, Raspberry Pi is playing a dynamic and prominent role in the era of …
an embedded computer, Raspberry Pi is playing a dynamic and prominent role in the era of …
[PDF][PDF] A Lightweight Attribute-Based Access Control System for IoT.
S Monir - 2016 - harvest.usask.ca
The evolution of the Internet of things (IoT) has made a significant impact on our daily and
professional life. Home and office automation are now even easier with the implementation …
professional life. Home and office automation are now even easier with the implementation …
Analysis of tizen security model and ways of bypassing it on smart tv platform
M Majchrowicz, P Duch - Applied Sciences, 2021 - mdpi.com
The smart TV market is growing at an ever faster pace every year. Smart TVs are equipped
with many advanced functions, allow users to search, chat, browse, share, update, and …
with many advanced functions, allow users to search, chat, browse, share, update, and …
A phase of deleted file recovery for digital forensics research in Tizen
Digital Forensics, not only for the computers of suspect, needs to collect the various digital
evidences especially in many different kinds of mobile devices and operating systems …
evidences especially in many different kinds of mobile devices and operating systems …